23,423 research outputs found

    Mechanical Timepieces & Intellectual Property Protection

    Get PDF
    This article is meant to give you a basic understanding of mechanical timepieces—not just what they are, but how they are different from one another and why that difference is significant. Watches themselves do not need an introduction; they are ubiquitous and have withstood the peaks and troughs of social inequality and have persisted as a commonality between the rich, the poor and the middleclass since the beginning of their mass production in the 19th century. I focus here on the history of watches within the United States because, ultimately, this is a discussion of their legal protection under United States intellectual property law and not a full history lesson on horology. If you would like to establish a foundation of knowledge for the intellectual property which this article discusses, I suggest first reading of the achievements of individuals such as Christiaan Huygens, Peter Henlein, Patek Philippe and Louis Cartier. This article will focus on two areas of intellectual property, patents and trademarks, and their application to mechanical timepieces

    The Experience of the 756th Tank Battalion in World War Two: A Microcosm

    Get PDF
    December 7, 1941, a day which will live in infamy, was the moment that the United States was plunged into the largest conflict that the world had ever seen. The sovereignty of the United States was being threatened at two ends of the globe by tyrannical leaders on the continent of Europe and the islands of the Pacific. In the years to come, the U.S. would have to fight to stop the spread of Emperor Hirohito\u27s army in the Pacific and Hitler\u27s Nazi Wermacht in Europe. It would take all the resources our mighty country could muster and the fighting spirit of the nation\u27s youth to conquer the enemy that was before us. The U.S.\u27s fighting spirit was displayed in battlefields the world over, but no more so than in the European Theatre of Operations by the 756th Tank Battalion. The wide and varied experience of the 756th Tank Battalion in its conquest through the European Theatre can be used as a microcosm that mirrors the experience of the soldiers who fought in the different sectors of that theatre. To trace the 756th from its roots in the Pacific Northwest to its final battle in Salzburg, Germany, helps one to better understand the experience of the American G.I. in the Second World War. To understand how the experience of the 756th Tank Battalion differed over time, location, and unit attachment in each facet of the European Theatre of Operations is to better understand how the characteristic American soldier\u27s experience differed over the same locations

    Progress in Consumer Credit in Kentucky

    Get PDF

    SUPPLIERS: Monitoring the Performance of Labor Brokers: Introduction & Key Issues of Concern

    Get PDF
    This document is part of a digital collection provided by the Martin P. Catherwood Library, ILR School, Cornell University, pertaining to the effects of globalization on the workplace worldwide. Special emphasis is placed on labor rights, working conditions, labor market changes, and union organizing.V_SUPPLIERS_monitoring_performance_of_labor_brokers.pdf: 70 downloads, before Oct. 1, 2020

    Laptop theft: a case study on effectiveness of security mechanisms in open organizations

    Get PDF
    Organizations rely on physical, technical and procedural mechanisms to protect their physical assets. Of all physical assets, laptops are the probably the most troublesome to protect, since laptops are easy to remove and conceal. Organizations open to the public, such as hospitals and universities, are easy targets for laptop thieves, since every day hundreds of people not employed by the organization wander in the premises. The problem security professionals face is how to protect the laptops in such open organizations. \ud \ud In this study, we look at the eectiveness of the security mechanisms against laptop theft in two universities. We analyze the logs from laptop thefts in both universities and complement the results with penetration tests. The results from the study show that surveillance cameras and access control have a limited role in the security of the organization and that the level of security awareness of the employees plays the biggest role in stopping theft. The results of this study are intended to aid security professionals in the prioritization of security mechanisms

    By a Thread: The New Experience of America's Middle Class

    Get PDF
    Developed in collaboration with the Institute on Assets and Social Policy at Brandeis University, By a Thread: The New Experience of America's Middle Class looks at the financial security of the middle class using the innovative Middle Class Security Index, rating household stability across five core economic factors: assets, educational achievement, housing costs, budget and healthcare. The Index provides a comprehensive portrait of how well middle-class families are faring in each of these areas, with spotlight on the strengths and vulnerabilities of today's middle class

    Definite Descriptions and the Gettier Example

    Get PDF
    This paper challenges the first Gettier counterexample to the tripartite account of knowledge. Noting that 'the man who will get the job' is a description and invoking Donnellan's distinction between their 'referential' and 'attributive' uses, I argue that Smith does not actually believe that the man who will get the job has ten coins in his pocket. Smith's ignorance about who will get the job shows that the belief cannot be understood referentially, his ignorance of the coins in his pocket shows that it cannot be understood attributively. An explanation for why Smith appeared to have justified true belief is given by distinguishing between 'belief' and 'belief in truth'. Smith believes the sentence 'the man who will get the job has ten coins in his pocket' to be true (he mistakenly believes that Jones will get the job, of whom he knows that he has ten coins in his pocket) (hence his 'belief'), the sentence is true (hence 'truth'), and he has sufficient reason to assent to it (hence his 'justification'). But he does not believe the proposition expressed. Hence he does not know it eithe

    Reproductive Health Aid: A Delicate Balancing Act

    Get PDF
    In this contribution the authors show that development assistance targeting reproductive health overwhelmingly concentrates on HIV/AIDS at the expense of family planning elements. Data on financial contributions disbursed by governments and private foundations are used as collected by the Resource Flows project as initiated by UNFPA/NIDI. The current allocation of aid does not accord well with the plans made in Cairo at the International Conference on Population and Development in 1994. Part of the explanation is that future health needs are difficult to predict, but it also shows how strong the influence of one donor, i.e. the United States, is in this setup. The landscape of population assistance is a highly volatile one, brought about not only by political issues like the Global Gag Rule, but also issues of collective action design as assistance under the heading of the Millennium Development Goals crowds out family planning. A complicating factor is that development assistance for reproductive health is at some points ill-adjusted towards the needs of developing countries.health;development aid;AIDS;fertility
    • …
    corecore